


<?xml version="1.0" encoding="UTF-8"?>
<record>
  <title>Detection of Node Replication Attacks in Wireless Sensor Networks</title>
  <journal>Journal of Networking Technology</journal>
  <author>Ramneet Kaur</author>
  <volume>8</volume>
  <issue>1</issue>
  <year>2017</year>
  <doi></doi>
  <url>http://www.dline.info/jnt/fulltext/v8n1/jntv8n1_2.pdf</url>
  <abstract>Because of their exceptional qualities, WSNs are grabbing attention in the research community. WSNs are very
less into view. Subsequently it is easily possible for an assaulter to catch a node physically, altering its code and getting
private data like cryptographic keys. Wireless medium is inherently broadcast in nature which makes it open to attacks.
These attacks can bother the operation of WSN and can even kill the purpose of their deployment [3]. Keeping in mind the
end goal to ensure the data in WSN, some approaches are severely required that can make data transmission more secure
from the attackers. Node replication attack or clone attack is a standout amongst the most destructive and perilous risk to an
unattended wireless sensor network in light of the fact that in this attack, an adversary not only compromises the sensor
nodes but can also carry out a large class of internal attacks for instance DoS attack, Sybil attack, and Black hole, and
wormhole attack. Numerous strategies have been proposed for the detection of node replication attack and some fairly
serious limitations like the base station introduce a single point of failure, and any compromise of the base station makes the
solution useless. This leads to the motivation to work in this research area. A solution to avoid the node replication attack
has been proposed. The solution will be implemented in NS-2.</abstract>
</record>
